General

  • Target

    deeptvpro-v1.0.73-android.apk

  • Size

    26.8MB

  • Sample

    241110-n53f7swemq

  • MD5

    ce79089f2a1e87f6c2e36bedfee6d950

  • SHA1

    76835fd650dfdd3b0096ab1a9de1d4e8b5a6a860

  • SHA256

    9a94eed24f15400eeef247b8eddfb584e9ab4b45e39e3922dd838dddec8f9933

  • SHA512

    c35c1bdd081ddc5e9995b8969c12ee271b0a945b3d418ff47efbefeee29511f63dfe1e322738679aa27e69c79b8af0736d4898daa3c3a999185b837324276a5b

  • SSDEEP

    786432:q4J10mUQNQuLpbHTeX3lPQQY+pS/MhgjB/:qoUQSuLpOHpQQY+pxgjB/

Malware Config

Targets

    • Target

      deeptvpro-v1.0.73-android.apk

    • Size

      26.8MB

    • MD5

      ce79089f2a1e87f6c2e36bedfee6d950

    • SHA1

      76835fd650dfdd3b0096ab1a9de1d4e8b5a6a860

    • SHA256

      9a94eed24f15400eeef247b8eddfb584e9ab4b45e39e3922dd838dddec8f9933

    • SHA512

      c35c1bdd081ddc5e9995b8969c12ee271b0a945b3d418ff47efbefeee29511f63dfe1e322738679aa27e69c79b8af0736d4898daa3c3a999185b837324276a5b

    • SSDEEP

      786432:q4J10mUQNQuLpbHTeX3lPQQY+pS/MhgjB/:qoUQSuLpOHpQQY+pxgjB/

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks